Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Craig Gallek | 3193 | 94.92% | 3 | 37.50% |
Daniel Borkmann | 91 | 2.71% | 1 | 12.50% |
Eric Dumazet | 61 | 1.81% | 1 | 12.50% |
Helge Deller | 15 | 0.45% | 1 | 12.50% |
Dmitry Safonov | 3 | 0.09% | 1 | 12.50% |
Wang Yufen | 1 | 0.03% | 1 | 12.50% |
Total | 3364 | 8 |
/* * Test functionality of BPF filters for SO_REUSEPORT. The tests below will use * a BPF program (both classic and extended) to read the first word from an * incoming packet (expected to be in network byte-order), calculate a modulus * of that number, and then dispatch the packet to the Nth socket using the * result. These tests are run for each supported address family and protocol. * Additionally, a few edge cases in the implementation are tested. */ #include <errno.h> #include <error.h> #include <fcntl.h> #include <linux/bpf.h> #include <linux/filter.h> #include <linux/unistd.h> #include <netinet/in.h> #include <netinet/tcp.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/epoll.h> #include <sys/types.h> #include <sys/socket.h> #include <sys/resource.h> #include <unistd.h> #include "../kselftest.h" struct test_params { int recv_family; int send_family; int protocol; size_t recv_socks; uint16_t recv_port; uint16_t send_port_min; }; static size_t sockaddr_size(void) { return sizeof(struct sockaddr_storage); } static struct sockaddr *new_any_sockaddr(int family, uint16_t port) { struct sockaddr_storage *addr; struct sockaddr_in *addr4; struct sockaddr_in6 *addr6; addr = malloc(sizeof(struct sockaddr_storage)); memset(addr, 0, sizeof(struct sockaddr_storage)); switch (family) { case AF_INET: addr4 = (struct sockaddr_in *)addr; addr4->sin_family = AF_INET; addr4->sin_addr.s_addr = htonl(INADDR_ANY); addr4->sin_port = htons(port); break; case AF_INET6: addr6 = (struct sockaddr_in6 *)addr; addr6->sin6_family = AF_INET6; addr6->sin6_addr = in6addr_any; addr6->sin6_port = htons(port); break; default: error(1, 0, "Unsupported family %d", family); } return (struct sockaddr *)addr; } static struct sockaddr *new_loopback_sockaddr(int family, uint16_t port) { struct sockaddr *addr = new_any_sockaddr(family, port); struct sockaddr_in *addr4; struct sockaddr_in6 *addr6; switch (family) { case AF_INET: addr4 = (struct sockaddr_in *)addr; addr4->sin_addr.s_addr = htonl(INADDR_LOOPBACK); break; case AF_INET6: addr6 = (struct sockaddr_in6 *)addr; addr6->sin6_addr = in6addr_loopback; break; default: error(1, 0, "Unsupported family %d", family); } return addr; } static void attach_ebpf(int fd, uint16_t mod) { static char bpf_log_buf[65536]; static const char bpf_license[] = "GPL"; int bpf_fd; const struct bpf_insn prog[] = { /* BPF_MOV64_REG(BPF_REG_6, BPF_REG_1) */ { BPF_ALU64 | BPF_MOV | BPF_X, BPF_REG_6, BPF_REG_1, 0, 0 }, /* BPF_LD_ABS(BPF_W, 0) R0 = (uint32_t)skb[0] */ { BPF_LD | BPF_ABS | BPF_W, 0, 0, 0, 0 }, /* BPF_ALU64_IMM(BPF_MOD, BPF_REG_0, mod) */ { BPF_ALU64 | BPF_MOD | BPF_K, BPF_REG_0, 0, 0, mod }, /* BPF_EXIT_INSN() */ { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } }; union bpf_attr attr; memset(&attr, 0, sizeof(attr)); attr.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; attr.insn_cnt = ARRAY_SIZE(prog); attr.insns = (unsigned long) &prog; attr.license = (unsigned long) &bpf_license; attr.log_buf = (unsigned long) &bpf_log_buf; attr.log_size = sizeof(bpf_log_buf); attr.log_level = 1; attr.kern_version = 0; bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr)); if (bpf_fd < 0) error(1, errno, "ebpf error. log:\n%s\n", bpf_log_buf); if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, sizeof(bpf_fd))) error(1, errno, "failed to set SO_ATTACH_REUSEPORT_EBPF"); close(bpf_fd); } static void attach_cbpf(int fd, uint16_t mod) { struct sock_filter code[] = { /* A = (uint32_t)skb[0] */ { BPF_LD | BPF_W | BPF_ABS, 0, 0, 0 }, /* A = A % mod */ { BPF_ALU | BPF_MOD, 0, 0, mod }, /* return A */ { BPF_RET | BPF_A, 0, 0, 0 }, }; struct sock_fprog p = { .len = ARRAY_SIZE(code), .filter = code, }; if (setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, &p, sizeof(p))) error(1, errno, "failed to set SO_ATTACH_REUSEPORT_CBPF"); } static void build_recv_group(const struct test_params p, int fd[], uint16_t mod, void (*attach_bpf)(int, uint16_t)) { struct sockaddr * const addr = new_any_sockaddr(p.recv_family, p.recv_port); int i, opt; for (i = 0; i < p.recv_socks; ++i) { fd[i] = socket(p.recv_family, p.protocol, 0); if (fd[i] < 0) error(1, errno, "failed to create recv %d", i); opt = 1; if (setsockopt(fd[i], SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) error(1, errno, "failed to set SO_REUSEPORT on %d", i); if (i == 0) attach_bpf(fd[i], mod); if (bind(fd[i], addr, sockaddr_size())) error(1, errno, "failed to bind recv socket %d", i); if (p.protocol == SOCK_STREAM) { opt = 4; if (setsockopt(fd[i], SOL_TCP, TCP_FASTOPEN, &opt, sizeof(opt))) error(1, errno, "failed to set TCP_FASTOPEN on %d", i); if (listen(fd[i], p.recv_socks * 10)) error(1, errno, "failed to listen on socket"); } } free(addr); } static void send_from(struct test_params p, uint16_t sport, char *buf, size_t len) { struct sockaddr * const saddr = new_any_sockaddr(p.send_family, sport); struct sockaddr * const daddr = new_loopback_sockaddr(p.send_family, p.recv_port); const int fd = socket(p.send_family, p.protocol, 0), one = 1; if (fd < 0) error(1, errno, "failed to create send socket"); if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one))) error(1, errno, "failed to set reuseaddr"); if (bind(fd, saddr, sockaddr_size())) error(1, errno, "failed to bind send socket"); if (sendto(fd, buf, len, MSG_FASTOPEN, daddr, sockaddr_size()) < 0) error(1, errno, "failed to send message"); close(fd); free(saddr); free(daddr); } static void test_recv_order(const struct test_params p, int fd[], int mod) { char recv_buf[8], send_buf[8]; struct msghdr msg; struct iovec recv_io = { recv_buf, 8 }; struct epoll_event ev; int epfd, conn, i, sport, expected; uint32_t data, ndata; epfd = epoll_create(1); if (epfd < 0) error(1, errno, "failed to create epoll"); for (i = 0; i < p.recv_socks; ++i) { ev.events = EPOLLIN; ev.data.fd = fd[i]; if (epoll_ctl(epfd, EPOLL_CTL_ADD, fd[i], &ev)) error(1, errno, "failed to register sock %d epoll", i); } memset(&msg, 0, sizeof(msg)); msg.msg_iov = &recv_io; msg.msg_iovlen = 1; for (data = 0; data < p.recv_socks * 2; ++data) { sport = p.send_port_min + data; ndata = htonl(data); memcpy(send_buf, &ndata, sizeof(ndata)); send_from(p, sport, send_buf, sizeof(ndata)); i = epoll_wait(epfd, &ev, 1, -1); if (i < 0) error(1, errno, "epoll wait failed"); if (p.protocol == SOCK_STREAM) { conn = accept(ev.data.fd, NULL, NULL); if (conn < 0) error(1, errno, "error accepting"); i = recvmsg(conn, &msg, 0); close(conn); } else { i = recvmsg(ev.data.fd, &msg, 0); } if (i < 0) error(1, errno, "recvmsg error"); if (i != sizeof(ndata)) error(1, 0, "expected size %zd got %d", sizeof(ndata), i); for (i = 0; i < p.recv_socks; ++i) if (ev.data.fd == fd[i]) break; memcpy(&ndata, recv_buf, sizeof(ndata)); fprintf(stderr, "Socket %d: %d\n", i, ntohl(ndata)); expected = (sport % mod); if (i != expected) error(1, 0, "expected socket %d", expected); } } static void test_reuseport_ebpf(struct test_params p) { int i, fd[p.recv_socks]; fprintf(stderr, "Testing EBPF mod %zd...\n", p.recv_socks); build_recv_group(p, fd, p.recv_socks, attach_ebpf); test_recv_order(p, fd, p.recv_socks); p.send_port_min += p.recv_socks * 2; fprintf(stderr, "Reprograming, testing mod %zd...\n", p.recv_socks / 2); attach_ebpf(fd[0], p.recv_socks / 2); test_recv_order(p, fd, p.recv_socks / 2); for (i = 0; i < p.recv_socks; ++i) close(fd[i]); } static void test_reuseport_cbpf(struct test_params p) { int i, fd[p.recv_socks]; fprintf(stderr, "Testing CBPF mod %zd...\n", p.recv_socks); build_recv_group(p, fd, p.recv_socks, attach_cbpf); test_recv_order(p, fd, p.recv_socks); p.send_port_min += p.recv_socks * 2; fprintf(stderr, "Reprograming, testing mod %zd...\n", p.recv_socks / 2); attach_cbpf(fd[0], p.recv_socks / 2); test_recv_order(p, fd, p.recv_socks / 2); for (i = 0; i < p.recv_socks; ++i) close(fd[i]); } static void test_extra_filter(const struct test_params p) { struct sockaddr * const addr = new_any_sockaddr(p.recv_family, p.recv_port); int fd1, fd2, opt; fprintf(stderr, "Testing too many filters...\n"); fd1 = socket(p.recv_family, p.protocol, 0); if (fd1 < 0) error(1, errno, "failed to create socket 1"); fd2 = socket(p.recv_family, p.protocol, 0); if (fd2 < 0) error(1, errno, "failed to create socket 2"); opt = 1; if (setsockopt(fd1, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) error(1, errno, "failed to set SO_REUSEPORT on socket 1"); if (setsockopt(fd2, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) error(1, errno, "failed to set SO_REUSEPORT on socket 2"); attach_ebpf(fd1, 10); attach_ebpf(fd2, 10); if (bind(fd1, addr, sockaddr_size())) error(1, errno, "failed to bind recv socket 1"); if (!bind(fd2, addr, sockaddr_size()) || errno != EADDRINUSE) error(1, errno, "bind socket 2 should fail with EADDRINUSE"); free(addr); } static void test_filter_no_reuseport(const struct test_params p) { struct sockaddr * const addr = new_any_sockaddr(p.recv_family, p.recv_port); const char bpf_license[] = "GPL"; struct bpf_insn ecode[] = { { BPF_ALU64 | BPF_MOV | BPF_K, BPF_REG_0, 0, 0, 10 }, { BPF_JMP | BPF_EXIT, 0, 0, 0, 0 } }; struct sock_filter ccode[] = {{ BPF_RET | BPF_A, 0, 0, 0 }}; union bpf_attr eprog; struct sock_fprog cprog; int fd, bpf_fd; fprintf(stderr, "Testing filters on non-SO_REUSEPORT socket...\n"); memset(&eprog, 0, sizeof(eprog)); eprog.prog_type = BPF_PROG_TYPE_SOCKET_FILTER; eprog.insn_cnt = ARRAY_SIZE(ecode); eprog.insns = (unsigned long) &ecode; eprog.license = (unsigned long) &bpf_license; eprog.kern_version = 0; memset(&cprog, 0, sizeof(cprog)); cprog.len = ARRAY_SIZE(ccode); cprog.filter = ccode; bpf_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &eprog, sizeof(eprog)); if (bpf_fd < 0) error(1, errno, "ebpf error"); fd = socket(p.recv_family, p.protocol, 0); if (fd < 0) error(1, errno, "failed to create socket 1"); if (bind(fd, addr, sockaddr_size())) error(1, errno, "failed to bind recv socket 1"); errno = 0; if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_EBPF, &bpf_fd, sizeof(bpf_fd)) || errno != EINVAL) error(1, errno, "setsockopt should have returned EINVAL"); errno = 0; if (!setsockopt(fd, SOL_SOCKET, SO_ATTACH_REUSEPORT_CBPF, &cprog, sizeof(cprog)) || errno != EINVAL) error(1, errno, "setsockopt should have returned EINVAL"); free(addr); } static void test_filter_without_bind(void) { int fd1, fd2, opt = 1; fprintf(stderr, "Testing filter add without bind...\n"); fd1 = socket(AF_INET, SOCK_DGRAM, 0); if (fd1 < 0) error(1, errno, "failed to create socket 1"); fd2 = socket(AF_INET, SOCK_DGRAM, 0); if (fd2 < 0) error(1, errno, "failed to create socket 2"); if (setsockopt(fd1, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) error(1, errno, "failed to set SO_REUSEPORT on socket 1"); if (setsockopt(fd2, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt))) error(1, errno, "failed to set SO_REUSEPORT on socket 2"); attach_ebpf(fd1, 10); attach_cbpf(fd2, 10); close(fd1); close(fd2); } void enable_fastopen(void) { int fd = open("/proc/sys/net/ipv4/tcp_fastopen", 0); int rw_mask = 3; /* bit 1: client side; bit-2 server side */ int val, size; char buf[16]; if (fd < 0) error(1, errno, "Unable to open tcp_fastopen sysctl"); if (read(fd, buf, sizeof(buf)) <= 0) error(1, errno, "Unable to read tcp_fastopen sysctl"); val = atoi(buf); close(fd); if ((val & rw_mask) != rw_mask) { fd = open("/proc/sys/net/ipv4/tcp_fastopen", O_RDWR); if (fd < 0) error(1, errno, "Unable to open tcp_fastopen sysctl for writing"); val |= rw_mask; size = snprintf(buf, 16, "%d", val); if (write(fd, buf, size) <= 0) error(1, errno, "Unable to write tcp_fastopen sysctl"); close(fd); } } static struct rlimit rlim_old; static __attribute__((constructor)) void main_ctor(void) { getrlimit(RLIMIT_MEMLOCK, &rlim_old); if (rlim_old.rlim_cur != RLIM_INFINITY) { struct rlimit rlim_new; rlim_new.rlim_cur = rlim_old.rlim_cur + (1UL << 20); rlim_new.rlim_max = rlim_old.rlim_max + (1UL << 20); setrlimit(RLIMIT_MEMLOCK, &rlim_new); } } static __attribute__((destructor)) void main_dtor(void) { setrlimit(RLIMIT_MEMLOCK, &rlim_old); } int main(void) { fprintf(stderr, "---- IPv4 UDP ----\n"); /* NOTE: UDP socket lookups traverse a different code path when there * are > 10 sockets in a group. Run the bpf test through both paths. */ test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8000, .send_port_min = 9000}); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8000, .send_port_min = 9000}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8001, .send_port_min = 9020}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8001, .send_port_min = 9020}); test_extra_filter((struct test_params) { .recv_family = AF_INET, .protocol = SOCK_DGRAM, .recv_port = 8002}); test_filter_no_reuseport((struct test_params) { .recv_family = AF_INET, .protocol = SOCK_DGRAM, .recv_port = 8008}); fprintf(stderr, "---- IPv6 UDP ----\n"); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8003, .send_port_min = 9040}); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8003, .send_port_min = 9040}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8004, .send_port_min = 9060}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8004, .send_port_min = 9060}); test_extra_filter((struct test_params) { .recv_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_port = 8005}); test_filter_no_reuseport((struct test_params) { .recv_family = AF_INET6, .protocol = SOCK_DGRAM, .recv_port = 8009}); fprintf(stderr, "---- IPv6 UDP w/ mapped IPv4 ----\n"); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8006, .send_port_min = 9080}); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8006, .send_port_min = 9080}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 10, .recv_port = 8007, .send_port_min = 9100}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_DGRAM, .recv_socks = 20, .recv_port = 8007, .send_port_min = 9100}); /* TCP fastopen is required for the TCP tests */ enable_fastopen(); fprintf(stderr, "---- IPv4 TCP ----\n"); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8008, .send_port_min = 9120}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET, .send_family = AF_INET, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8009, .send_port_min = 9160}); test_extra_filter((struct test_params) { .recv_family = AF_INET, .protocol = SOCK_STREAM, .recv_port = 8010}); test_filter_no_reuseport((struct test_params) { .recv_family = AF_INET, .protocol = SOCK_STREAM, .recv_port = 8011}); fprintf(stderr, "---- IPv6 TCP ----\n"); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8012, .send_port_min = 9200}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET6, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8013, .send_port_min = 9240}); test_extra_filter((struct test_params) { .recv_family = AF_INET6, .protocol = SOCK_STREAM, .recv_port = 8014}); test_filter_no_reuseport((struct test_params) { .recv_family = AF_INET6, .protocol = SOCK_STREAM, .recv_port = 8015}); fprintf(stderr, "---- IPv6 TCP w/ mapped IPv4 ----\n"); test_reuseport_ebpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8016, .send_port_min = 9320}); test_reuseport_cbpf((struct test_params) { .recv_family = AF_INET6, .send_family = AF_INET, .protocol = SOCK_STREAM, .recv_socks = 10, .recv_port = 8017, .send_port_min = 9360}); test_filter_without_bind(); fprintf(stderr, "SUCCESS\n"); return 0; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1